Which of the following statements are true?

a. An anonymous inner class is an inner class without a name.
b. An anonymous inner class must always extend a superclass or implement an interface, but it cannot have an explicit extends or implements clause.
c. An anonymous inner class must implement all the abstract methods in the superclass or in the interface.
d. An anonymous inner class always uses the no-arg constructor from its superclass to create an instance. If an anonymous inner class implements an interface, the constructor is Object().
e. An anonymous inner class is compiled into a class named OuterClassName$n.class.


a. An anonymous inner class is an inner class without a name.
b. An anonymous inner class must always extend a superclass or implement an interface, but it cannot have an explicit extends or implements clause.
c. An anonymous inner class must implement all the abstract methods in the superclass or in the interface.
d. An anonymous inner class always uses the no-arg constructor from its superclass to create an instance. If an anonymous inner class implements an interface, the constructor is Object().
e. An anonymous inner class is compiled into a class named OuterClassName$n.class.

Computer Science & Information Technology

You might also like to view...

Words that have a special meaning and may be used only for their intended purpose are known as

a. operators b. programmer defined words c. key words d. syntax e. None of these

Computer Science & Information Technology

Facebook and LinkedIn are examples of:

a.forums b.MMORPGs c.social networks d.wikis

Computer Science & Information Technology

Named after two protocols, _________________ is really several subprotocols, designed to work together.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A small business owner has asked the security consultant to suggest an inexpensive means to deter physical intrusions at their place of business. Which of the following would BEST meet their request?

A. Fake cameras B. Proximity readers C. Infrared cameras D. Security guards

Computer Science & Information Technology